Server IP : 180.180.241.3 / Your IP : 216.73.216.252 Web Server : Microsoft-IIS/7.5 System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586 User : IUSR ( 0) PHP Version : 5.3.28 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : C:/Program Files (x86)/MySQL/MySQL Workbench 6.1 CE/python/site-packages/Crypto/Cipher/ |
Upload File : |
ó ¤'Sc @ sQ d Z d Z d d l m Z d d d „ ƒ YZ d „ Z d Z e d d ƒ Z d S( s‚ ARC4 symmetric cipher ARC4_ (Alleged RC4) is an implementation of RC4 (Rivest's Cipher version 4), a symmetric stream cipher designed by Ron Rivest in 1987. The cipher started as a proprietary design, that was reverse engineered and anonymously posted on Usenet in 1994. The company that owns RC4 (RSA Data Inc.) never confirmed the correctness of the leaked algorithm. Unlike RC2, the company has never published the full specification of RC4, of whom it still holds the trademark. ARC4 keys can vary in length from 40 to 2048 bits. One problem of ARC4 is that it does not take a nonce or an IV. If it is required to encrypt multiple messages with the same long-term key, a distinct independent nonce must be created for each message, and a short-term key must be derived from the combination of the long-term key and the nonce. Due to the weak key scheduling algorithm of RC2, the combination must be carried out with a complex function (e.g. a cryptographic hash) and not by simply concatenating key and nonce. New designs should not use ARC4. A good alternative is AES (`Crypto.Cipher.AES`) in any of the modes that turn it into a stream cipher (OFB, CFB, or CTR). As an example, encryption can be done as follows: >>> from Crypto.Cipher import ARC4 >>> from Crypto.Hash import SHA >>> from Crypto import Random >>> >>> key = b'Very long and confidential key' >>> nonce = Random.new().read(16) >>> tempkey = SHA.new(key+nonce).digest() >>> cipher = ARC4.new(tempkey) >>> msg = nonce + cipher.encrypt(b'Open the pod bay doors, HAL') .. _ARC4: http://en.wikipedia.org/wiki/RC4 :undocumented: __revision__, __package__ s $Id$iÿÿÿÿ( t _ARC4t ARC4Cipherc B s) e Z d Z d „ Z d „ Z d „ Z RS( s ARC4 cipher objectc O s: t j | | | Ž | _ | j j | _ | j j | _ d S( sW Initialize an ARC4 cipher object See also `new()` at the module level.N( R t newt _ciphert block_sizet key_size( t selft keyt argst kwargs( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyt __init__H s c C s | j j | ƒ S( sñ Encrypt a piece of data. :Parameters: plaintext : byte string The piece of data to encrypt. It can be of any size. :Return: the encrypted data (byte string, as long as the plaintext). ( R t encrypt( R t plaintext( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyR Q s c C s | j j | ƒ S( só Decrypt a piece of data. :Parameters: ciphertext : byte string The piece of data to decrypt. It can be of any size. :Return: the decrypted data (byte string, as long as the ciphertext). ( R t decrypt( R t ciphertext( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyR \ s ( t __name__t __module__t __doc__R R R ( ( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyR D s c O s t | | | Ž S( s, Create a new ARC4 cipher :Parameters: key : byte string The secret key to use in the symmetric cipher. It can have any length, with a minimum of 40 bytes. Its cryptograpic strength is always capped to 2048 bits (256 bytes). :Return: an `ARC4Cipher` object ( R ( R R R ( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyR g s i i N( i ( R t __revision__t Crypto.CipherR R R R t xrangeR ( ( ( s^ C:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Cipher\ARC4.pyt <module>>